Abstract
In the Internet of Things (IoT) paradigm, devices involved will frequently face different types of attacks, for example flood attacks, eavesdropping attacks and so on. Once attackers have compromised the IoT device, the data materials of the IoT device will not remain confidential, and it will then be captured by the attacker; this will in turn threaten the entire network. Consequently, to safeguard IoTs, this paper proposes a public and secret key with token sharing (IoT-PSKTS) algorithm to avoid key leakages in IoT. Cryptography can be utilized for secure communication in the presence of attackers. In cryptography, a conventional public key cryptosystem will be suitable because they do not require the sender and receiver to deliver the same secret to contact without threat. But, they regularly depend on intricate mathematical calculations and are thus much more incompetent than comparable symmetric key cryptosystems. In a large number of applications, the high price of encrypting lengthy messages in public key cryptography can be prohibitive. A hybrid system tackles it by utilizing a mixture of both. In IoT network, admin generates a public key, private key, secret key and token. The public and secret key will be used for packet encryption in IoT devices and base station side, and the private key will be utilized for decryption in the admin side and token used for IoT devices access control. For encryption purpose, admin shares public and secret key with a token for IoT devices and base station. Therefore, PSKTS algorithm has been used to securely share the public and secret key with a token for IoT devices and base station in a distributed way. The experimental results show that the proposed PSKTS algorithm shares a public and secret key with token in a secured way.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Carracedo JM, Milliken M, Chouhan PK, Scotney B, Lin Z (2018) Cryptography for security in Io. In: 2018 IEEE fifth international conference on internet of things: systems, management and security. ISBN: 978-1-5386-9585-2
Alramadhan M, Sha K (2017) An overview of access control mechanisms for the internet of thing. In: 2017 IEEE 26th International conference on computer communication and networks. ISBN: 978-1-5090-2991-4
Tang J, Song H, Xu A, Jiang Y, Wen H, Zhang Y, Qin K (2020) Secret sharing simultaneously on the internet of thing. In: 2020 IEEE international conference on power, intelligent computing and systems. ISBN: 978-1-7281-9874-3
Yousefi A, Jameii SM (2017) Improving the security of internet of things using encryption algorithm. In: 2017 IEEE international conference on IoT and application. ISBN: 978-1-5386-1698-7
Gunathilake NA, Buchanan WJ, Asif R (2019) Next generation lightweight cryptography for smart IoT devices: implementation, challenges and application. In: 2019 IEEE 5th world forum on internet of things. ISBN: 978-1-5386-4980-0
Terkawi A, Innab N, Amri SA, Amri AA (2018) Internet of things (IoT) increasing the necessity to adopt specific type of access control technique. In: 2018 IEEE 21st Saudi computer society national computer conference. ISBN: 978-1-5386-4110-1
Wang J, Wang H, Zhang H, Cao N (2017) Trust and attribute-based dynamic access control model for the internet of thing. In: 2017 IEEE international conference on cyber-enabled distributed computing and knowledge discovery. ISBN: 978-1-5386-2209-4
Surendran S, Nassef A, Beheshti BD (2018) A survey of cryptographic algorithms for IoT device. In: 2018 IEEE long Island systems, applications and technology conference. ISBN: 978-1-5386-5029-5
Miao L, Jiang D (2017) Optimal secret sharing for secure wireless communications in the era of internet of thing. In: 2017 IEEE 4th international conference on smart and sustainable city. ISBN: 978-1-78561-503-0
Farhadi M, Bypour H, Mortazavi R (2019) An efficient secret sharing-based storage system for cloud-based IoT. In: 2019 IEEE 16th international ISC conference on information security and cryptology. ISBN: 978-1-7281-4374-3
Fischlin M, Janson C, Mazaheri S (2018) Backdoored hash functions: immunizing HMAC and HKDF. In: 2018 IEEE 31st computer security foundations symposium (CSF). IEEE, pp 105–118
Suhaili SB, Watanabe T (2017) High-speed implementation of the keyed-hash message authentication code (HMAC) based on SHA-1 algorithm. Adv Sci Lett 23(11):11096–11100
Kishorebabu V, Sravanthi R (2020) Real-time monitoring of environmental parameters using IOT. Wireless Pers Commun 8:1–24
Kusuma HA, Anjasmara R, Suhendra T, Yunianto H, Nugraha S (2020) An IoT based coastal weather and air quality monitoring using GSM technology. J Phys Conf Ser 1501(1):012004
Buchanan WJ, Lanc D, Ukwandu E, Fan L, Russell G, Lo O (2015) The future internet: a world of secret share. Future Internet 7:445–464. https://doi.org/10.3390/fi7040445
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pradeepa, K., Parveen, M. (2021). IoT-PSKTS: Public and Secret Key with Token Sharing Algorithm to Prevent Keys Leakages in IoT. In: Pandian, A., Fernando, X., Islam, S.M.S. (eds) Computer Networks, Big Data and IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 66. Springer, Singapore. https://doi.org/10.1007/978-981-16-0965-7_62
Download citation
DOI: https://doi.org/10.1007/978-981-16-0965-7_62
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0964-0
Online ISBN: 978-981-16-0965-7
eBook Packages: EngineeringEngineering (R0)